Skip to main content

Research Repository

Advanced Search

Outputs (868)

Dynamic response of a laterally-loaded infinite rigid cylinder embedded in a saturated poroelastic medium (2010)
Presentation / Conference Contribution
Osman, A., & Hussein, M. (2010). Dynamic response of a laterally-loaded infinite rigid cylinder embedded in a saturated poroelastic medium. In W. Tizani (Ed.), Proceedings of 13th International Conference on Computing in Civil and Building Engineering (ICCBE 2010) and the 17th International EG-ICE Workshop on Intelligent Computing in Engineering (ICE10), Nottingham, UK, 30 June - 2 July 2010

In this paper, an analytical solution for the response of a rigid cylinder embedded in a full-space poroelastic medium subjected to a dynamic lateral load is derived. The problem is idealised as a two-dimensional problem. The solution is obtained usi... Read More about Dynamic response of a laterally-loaded infinite rigid cylinder embedded in a saturated poroelastic medium.

Numerical investigation of the behaviour of suction caissons in structured clays (2010)
Presentation / Conference Contribution
Panayides, S., Rouainia, M., & Osman, A. (2010). Numerical investigation of the behaviour of suction caissons in structured clays. In S. Gourvenec, & D. White. (Eds.), Frontiers in offshore geotechnics II (759-764). https://doi.org/10.1201/b10132-109

This paper investigates the ultimate capacity of suction anchor foundations, using an advanced constitutive model. The paper explores the effect of changing the aspect ratio of the caisson on the undrained load-carrying capacity of the bucket foundat... Read More about Numerical investigation of the behaviour of suction caissons in structured clays.

Modelling tertiary creep in geomaterials using a continuum damage mechanics approach (2014)
Presentation / Conference Contribution
Osman, A., & Birchall, T. (2014). Modelling tertiary creep in geomaterials using a continuum damage mechanics approach. In K. Soga, K. Kumar, G. Biscontin, & M. Kuo (Eds.), Geomechanics from micro to macro (705-708). https://doi.org/10.1201/b17395-126

Tertiary creep is often observed in soft rocks and it represents a problem in a mining environment. Tertiary creep behaviour appears due to progressive micro cracking of the material and would result in a loss of strength and stiffness, which may eve... Read More about Modelling tertiary creep in geomaterials using a continuum damage mechanics approach.

An overview of research activities and achievement in Geotechnics from the Scottish Universities Geotechnics Network (SUGN) (2015)
Presentation / Conference Contribution
Leung, A., Anastasopoulos, I., Augarde, C., Barreto, D., Brennan, A., Brown, M., …Zielinski, M. (2015). An overview of research activities and achievement in Geotechnics from the Scottish Universities Geotechnics Network (SUGN). In M. . G. Winter, D. . M. Smith, P. . J. . L. Eldred, & D. . G. Toll (Eds.), Geotechnical engineering for infrastructure and development : XVI European conference on soil mechanics and geotechnical engineering (4289-4294)

ABSTRACT: Design of geotechnical systems is often challenging as it requires the understanding of complex soil behaviour and its influence on field-scale performance of geo-structures. To advance the scientific knowledge and the technological develop... Read More about An overview of research activities and achievement in Geotechnics from the Scottish Universities Geotechnics Network (SUGN).

Three-dimensional finite element analysis of opening interaction in squeezing ground (2010)
Presentation / Conference Contribution
Birchall, T., & Osman, A. (2010). Three-dimensional finite element analysis of opening interaction in squeezing ground.

This paper presents a numerical study of the interaction of twin, horizontally aligned openings, deeply embedded in salt rock. Complex three-dimensional (3D) creep analyses were carried out using the Finite Element (FE) method. Findings show that ope... Read More about Three-dimensional finite element analysis of opening interaction in squeezing ground.

On the formulation of thermodynamically-consistent viscoplastic-damage constitutive models (2013)
Presentation / Conference Contribution
Birchall, T., & Osman, A. (2013). On the formulation of thermodynamically-consistent viscoplastic-damage constitutive models. In A. S. Osman, W. M. Coombs, & T. Koziara (Eds.), CM13 : proceedings of the International Conference on Computational Mechanics, 25-27 March 2013, Durham, UK

This paper illustrates the formulation of viscoplastic-damage constitutive models using the framework of hyperplasticity. The entire constitutive behaviour is derived from only two scalar potentials; a free energy potential and a dissipation potentia... Read More about On the formulation of thermodynamically-consistent viscoplastic-damage constitutive models.

Investments and Trade-offs in the Economics of Information Security. (2009)
Presentation / Conference Contribution
Ioannidis, C., Pym, D., & Williams, J. (2009). Investments and Trade-offs in the Economics of Information Security. In R. Dingledine, & P. Golle (Eds.), Financial cryptography and data security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009: revised selected papers (148-166). https://doi.org/10.1007/978-3-642-03549-4_9

We develop and simulate a dynamic model of investment in information security. The model is based on the recognition that both IT managers and users appreciate the trade-off between two of the fundamental characteristics of information security, name... Read More about Investments and Trade-offs in the Economics of Information Security..

The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures (2017)
Preprint / Working Paper
Allodi, L., Massacci, F., & Williams, J. (2017). The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures

A common presumption is that the typical cyber attacker is assumed to exploit all possible vulnerabilities with almost equal likelihood. That is, the probability of an attack on a given vulnerability is at maximum entropy, one cannot importance sampl... Read More about The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures.

Tax Reform, Unhealthy Commodities and Endogenous Health (2017)
Preprint / Working Paper
Wang, J., Marsiliani, L., & Renstrom, T. (2017). Tax Reform, Unhealthy Commodities and Endogenous Health

This paper explores how tax reforms with taxes on unhealthy commodities impact consumer behaviours and welfare when individual health is endogenised. We employ a dynamic general equilibrium model which includes both goods and health sectors. Although... Read More about Tax Reform, Unhealthy Commodities and Endogenous Health.

Increased warm water intrusions could cause mass loss in East Antarctica during the next 200 years (2023)
Journal Article
Jordan, J. R., Miles, B., Gudmundsson, G., Jamieson, S., Jenkins, A., & Stokes, C. (2023). Increased warm water intrusions could cause mass loss in East Antarctica during the next 200 years. Nature Communications, 14(1), Article 1825. https://doi.org/10.1038/s41467-023-37553-2

The East Antarctic Ice Sheet (EAIS) is currently surrounded by relatively cool water, but climatic shifts have the potential to increase basal melting via intrusions of warm modified Circumpolar Deep Water (mCDW) onto the continental shelf. Here we u... Read More about Increased warm water intrusions could cause mass loss in East Antarctica during the next 200 years.